Android Intent Redirection Vulnerability Exposes Millions

Significant risk — action recommended within 24-48 hours
Basically, a flaw in an Android SDK could let bad apps steal your data.
A severe vulnerability in EngageSDK risks sensitive data across millions of Android wallets. Developers must update their SDKs to protect users. This flaw highlights the importance of secure third-party integrations.
What Happened
During routine security research, Microsoft identified a severe intent redirection vulnerability in the EngageSDK, a widely used third-party Android SDK. This flaw allows apps on the same device to bypass Android's security sandbox, gaining unauthorized access to sensitive user data. With over 30 million installations of third-party crypto wallet applications alone, the risk to personal identifiable information (PII), user credentials, and financial data is significant.
Who's Affected
The vulnerability affects millions of Android users who have installed apps utilizing the EngageSDK. Specifically, it impacts third-party crypto wallet applications, which are often used to manage digital assets. All detected apps using vulnerable versions have been removed from Google Play to mitigate risk.
What Data Was Exposed
Sensitive data exposed includes:
- Personal Identifiable Information (PII)
- User credentials
- Financial data
What You Should Do
Developers integrating the EngageSDK should upgrade to version 5.2.1 or later, which resolves this vulnerability. Users who previously downloaded a vulnerable app are now protected due to Android's updated security measures.
The Flaw
The intent redirection vulnerability occurs when a threat actor manipulates the contents of an intent sent by a vulnerable app. This allows unauthorized access to protected components and sensitive data, potentially leading to privilege escalation within the Android environment.
What's at Risk
The risk extends to any application that relies on the EngageSDK for messaging and notifications. Given the high value of digital asset management, even minor flaws can have large-scale implications.
Patch Status
EngageLab has resolved the issue in version 5.2.1 of the EngageSDK, released on November 3, 2025. Developers must ensure they are using this updated version to protect their applications from exploitation.
Immediate Actions
- Developers: Review dependencies and validate exported components in your applications. Follow best practices for secure integration of third-party SDKs.
- Users: Ensure your apps are updated to the latest versions and monitor for any unusual activity in your accounts.
Conclusion
This vulnerability highlights the importance of scrutinizing third-party SDKs and their integration into applications. As mobile wallets and high-value apps become more common, vigilance is essential to safeguard user data against potential exploitation. Microsoft continues to provide resources and guidance to help developers strengthen their applications against such vulnerabilities.
🔍 How to Check If You're Affected
- 1.Review your app's dependencies for the EngageSDK.
- 2.Check if your app is using version 5.2.1 or later of EngageSDK.
- 3.Monitor for any unauthorized access or unusual behavior in your app.
🔒 Pro insight: The EngageSDK flaw underscores the critical need for robust vetting of third-party libraries to prevent widespread vulnerabilities in mobile applications.